A. , D. Atkins, and R. Austein, Threat Analysis of the Domain Name System, RFC, vol.3833, 2004.

A. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, Resource Records for the DNS Security Extensions, RFC, vol.4034, 2005.
DOI : 10.17487/rfc4034

]. S. Bel95 and . Bellovin, Using the Domain Name System for System Break-Ins, Proceedings of the 5th Usenix UNIX Security Symposium, 1995.

]. B. Cha03, E. Chan, H. Cohen, and . Kaplan, Identity-Based PKI for DNSSEC Master's Thesis Proactive Caching of DNS Records: Addressing a Performance Bottleneck, Symposium on Applications and the Internet, p.85594, 2001.

]. D. Eas99 and . Eastlake, Domain Name System Security Extensions, RFC, vol.2535, 1999.

G. Guette, B. Cousin-gie01, and ]. R. Gieben, Les faiblesses du DNS Chain of trust: The parent-child and keyholder-keysigner relations and their communication in dnssec, 22me rencontre f r ancophone sur la SScuritt et Architecture R seaux (SAR), p.2355244, 2001.

]. O. Gun03 and . Gundmundsson, Delegation Signer Resource Record, RFC, vol.3658, 2003.

J. Jung, E. Sit, H. Balakrishan, and R. Morris, DNS Performance and the EEectiveness of Caching Irisa Compromised keys in DNSSEC 13, Proceedings of the ACM SIGCOMM Internet Measurement Workshop '01, p.1533167, 2001.

]. P. Moc87a and . Kapetris, Domain Names -Concept and Facilities, RFC, vol.1034, 1987.

]. P. Moc87b and . Kapetris, Domain Names -Implementation and Speciication, RFC, vol.1035, 1987.

]. A. Odl95 and . Odlyzko, The future of integer factorization. CryptoBytes (The technical newsletter of RSA Laboratories Addressing Weaknesses in the Domain Name System, Sit00] E. Sit. A Study of Caching in the Internet Domain Name System, p.5512, 1993.